Abstract
LoRaWAN is the dominant protocol for communication in low-power Wide Area Networks in several European countries, and is being used increasingly in other parts of the world. We identified three vulnerabilities in the LoRaWAN protocol specification that can be used for launching Denial-of-Service (DoS) attacks against end-devices in a LoRaWAN network. We validated that these vulnerabilities can be exploited for DoS attacks by creating and simulating Coloured Petri Net models of relevant parts of the LoRaWAN protocol.
Original language | English |
---|---|
Title of host publication | ARES 2018 - 13th International Conference on Availability, Reliability and Security |
Place of Publication | New York, NY, USA |
Publisher | acm |
Chapter | 17:1-17:6 |
ISBN (Electronic) | 9781450364485 |
ISBN (Print) | 9781450364485 |
DOIs | |
Publication status | Published - 27 Aug 2018 |
Event | 13th International Conference on Availability, Reliability and Security - Hamburg, Germany Duration: 27 Aug 2018 → 30 Aug 2018 https://dl.acm.org/citation.cfm?doid=3230833.3230856 |
Conference
Conference | 13th International Conference on Availability, Reliability and Security |
---|---|
Abbreviated title | ARES 2018 |
Country/Territory | Germany |
City | Hamburg |
Period | 27/08/18 → 30/08/18 |
Internet address |
Keywords
- Denial-of-Service, Internet-of-Things, LoRaWAN, Vulnerability